Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 13:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://assets.stickpng.com/
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://assets.stickpng.com/
Resource
win10v2004-20231215-en
General
-
Target
http://assets.stickpng.com/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000b8b05cbb257937ff4129828477ae0cf7f074c5ca518a0e04edb570312d269545000000000e8000000002000020000000344cd280fad52690a4c45cbc1c94b7dbf7b9359994ef24fbe2c4b494c8ae647d20000000a517861e849c3df23a177d9532dcefc3635f2ddfaa459db921069656a237789b40000000ccaff27cfa66670ae7ad663629675f176c5ce6a647eaedffaa6e4b0ecf672391a3d41760d738eb4b340cf396ed52caa17294cf803b40b12566719c80a093bb64 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e67b38dc3fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5EDF1BE1-ABCF-11EE-B84A-D2016227024C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410623635" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2680 2440 iexplore.exe 28 PID 2440 wrote to memory of 2680 2440 iexplore.exe 28 PID 2440 wrote to memory of 2680 2440 iexplore.exe 28 PID 2440 wrote to memory of 2680 2440 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://assets.stickpng.com/1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc528bb9835cd57501821a8a38a30b90
SHA12698dcb794d9586b2039ab9cdb3c4af68911ddb7
SHA25683c4857477c9f54db6b321958d5a668b710d308a4ff42e2afab1d2c20cd8863b
SHA5129b38d97e6e19e7cd4878995669b4cb29fe1477d2415dd98c183652df187696c62fd893e9261917e4e41b8cae75f70dcd86980c9a785c50b85e0599a68b561e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53aaee0825d281577e521da5b25f32489
SHA1a34b2ea434d1990f06ee7a59a033217e60569cc0
SHA2565466be86cb10e9a3bc48cc812eba4347e8eb66586f2aafe20b40b0f271d169d9
SHA51259e67c1e4ba22d96573ccef5bad0c82140718010c43c2392c59ce34c1617bd9cfd558e87be61c3a0eb434c5ea5a90c0ad4ab61ce8bdc462768793b4c9643063f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ca585d63fda2f48ae9e79bca12f73e6
SHA15af96c85bfd1a22edd55f1b025a3bc764b402948
SHA2560f234fd1e099d3c593557f20549081114bdd3cbea6a9570cbecf82b72156b0d5
SHA51262467ed563deb795303377abf79e8aa167512ade1a4b3bfee815431f33c26cb19a1f386e2fecdac05ee488b69b580393781fd4d9dd59a91eb65a92668c81e909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517ccdc2db707a4f9d5958fe69ff88859
SHA1da93dd03691d5bffbfff5a00c2d5f678a1e0c35c
SHA25691098d2ca55ea01e8e22262d3d62d29feafa0036e3cee5116f1b9607473c9dc9
SHA512064dc8ef8e9477f0e86b03c26a0e4c1d7558ef70a94f58b2e7243e37a77a213f7954e4f8f0e8a8fafcc39f3ffd2fa3e87b047458dc58cbc8b46b6193e40ffa3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a88905c9457b24addc49ae29ba582c4b
SHA16bc809ab1db50948d5b9edab1e1d06d7a43bf3b0
SHA2568fe261bf194c70d6e2973b2f9c306794ad74bcbcf4d267c4761ed3e5faa11124
SHA5127fe5136abbdc96753cbc388c4031ad58f42fe7bd28b2fe297abaf4ddd0c60accd3ba5373cd050c53b75b56f7e83913836078984a3ccddc9c066790c050040530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9fd5a0b154b99cbf92615f53431e044
SHA10ab41939072a966aa0a64c1c255cfa47c20c5963
SHA2565d57696a2b8db5b67cf90f7449ca036703a7b29c296b2364587d39440abe8b0f
SHA51253319aaa70dc02ad844430e4eafb683e64fad7564003d673248b04db7f901c005ea25361dac024d44a261e6a6f4c014be075ff3b79b7d9ba788f2a88de9d45f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0349f753006f4aebe8a52da342b0dd3
SHA1134b7f0e320184fc01b12c9fba88627de948654b
SHA256284b697eb5cbc50f2895813c8b65be4228b3729043854a9c648b289f1d71a031
SHA512f4b037f5d1a84256ef45da8ee3d65b54a21fcb129fc15b16a703179572f1f7230c81f3a5832843372a74c7dca181a035b8684c62c00e88f881908e9bf5bf5803
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06